exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files Date: 2000-08-02 to 2000-08-03

C-intro.tar.gz
Posted Aug 2, 2000
Authored by Mixter | Site 1337.tsx.org

Introduction to programming in C - Written with the goal of letting people get the most knowledge as fast as possible from it.

SHA-256 | 9439ef84c7e9724856d38b8067ccdb5e81490db2fac03db7cd2b1ac0b573b0fd
NScan0666b14f.zip
Posted Aug 2, 2000
Authored by Averk | Site nscan.hypermart.net

NScan is a very fast portscanner for Windows (up to 200 ports per second) for both hosts and large networks with numerous features: it scans not only address ranges, but also files with host lists (e.g. proxy list, domain zone or old log), writes logs at the different detail levels, has speed limits, pre-defined service sets and so on. It includes a set of additional tools: whois client, that supports automatic information recognition and fetch, has query history and other features; traceroute, that traces all the way to the host at once in one or two seconds, making route discovery tenth times faster; TCP-based DNS client that supports most of the available options, including AXFR zone transfer.

Changes: Serious bugfixes, whois improvment.
tags | tcp
systems | windows
SHA-256 | d0249cf95a04dbcfe4c567d947beec59bdbc4ac21b4dd999816394b4683a9c9e
secret-agent-0.8.tar.gz
Posted Aug 2, 2000
Authored by Robert Bihlmeyer | Site vibe.at

Secret Agent keeps passphrases and passwords in memory for a configurable timespan. Various applications can be made to cooperate with the agent; support for PGP 2 and GnuPG is provided out of the box, so you do not have to enter your pass phrase every time you sign an email.

tags | encryption
SHA-256 | 77d90114502eb6d37ba85f7d701d359d5f4754253d40a13931b139f6b615e7c3
012.txt
Posted Aug 2, 2000
Authored by Suid | Site suid.kg

Pgxconfig is a Raptor graphics card configuration tool for Solaris which has multiple local vulnerabilities. The environment is not sanitized and root privileges are not dropped, allowing commands to be run as root. Local root exploit included.

tags | exploit, local, root, vulnerability
systems | solaris
SHA-256 | c672d208fcfc0115d16c23ed363ad4e7466f870b510a0b15f6d338ba4c585b0c
b0g-7.txt
Posted Aug 2, 2000
Authored by b0g, K-Rad Bob | Site b0g.org

B0g Issue 7 - In this issue: Defcon review, How to own ttysnoop, Taxonomy of Communications Intelligence, Hacking Pine, Paytel Canada payphones, A guide to daemons, Hacking Hotmail, and more.

tags | magazine
SHA-256 | e7b1fa44f23ed000e666ee7acfbae063c970503697538787259e6bf61dc3dbce
rpc.statd.x86.c
Posted Aug 2, 2000
Authored by Doing

Linux/x86 rpc.statd remote root exploit.

tags | exploit, remote, x86, root
systems | linux
SHA-256 | 5de64344dc9bb15b3f44b3de59e2f7aae939ea8399dc44a04ff687b5de770027
ntop.advisory.txt
Posted Aug 2, 2000
Authored by Cho Kyong-won | Site hackerslab.org

Ntop -w allows remote users who have permission to view traffic stats to view any file on the system as root.

tags | exploit, remote, root
SHA-256 | 9de1e58ef979bce83a724e3f9cce6f8179d09e842ccb1ec0db735e19f848fdb3
genocide.c
Posted Aug 2, 2000
Authored by Sectorx

genocide.c is a dos attack which affects many different web proxies by making multiple connections which tie up all the sockets.

tags | web, denial of service
SHA-256 | 9e065b8db3803c90b6a5c38e2cba0481dce096b68143e275d1d627f37235f6ce
proxy.dos
Posted Aug 2, 2000
Authored by Sectorx | Site xorteam.cjb.net

Many HTTP proxies are vulnerable to a denial of service attack because they do not timeout connections to a remote host, causing the proxy to run out of available sockets and start refusing connections. Tested against Delegate 6.1.13. Exploit code included.

tags | exploit, remote, web, denial of service
SHA-256 | a9552173fc6e379e7810ac0699fb84188c3ccbf628f94952e2b66c5ae4c71603
FS-073100-10-BEA.txt
Posted Aug 2, 2000
Authored by Shreeraj Shah | Site foundstone.com

Foundstone Security Advisory FS-073100-10-BEA - It is possible to compile and execute any arbitrary file within the web document root directory of the WebLogic server as if it were a JSP/JHTML file, even if the file type is not .jsp or .jhtml. If applications residing on the WebLogic server write to files within the web document root directory, it is possible to insert executable code in the form of JSP or JHTML tags and have the code compiled and executed using WebLogic's handlers. This can potentially cause an attacker to gain administrative control of the underlying operating systems.

tags | exploit, web, arbitrary, root
SHA-256 | efe85f651d73615fb6cff13785c85e629c1d6000de550891afe91b7b8b3f8677
ms00-053
Posted Aug 2, 2000

Microsoft Security Bulletin (MS00-053) - Patch Available for "Service Control Manager Named Pipe Impersonation" vulnerability. Microsoft has released a patch for a security vulnerability in Windows 2000 which allows a user logged onto a Windows 2000 machine from the keyboard to become an administrator on the machine. Microsoft FAQ on this issue available here.

systems | windows
SHA-256 | 811816b8f54eeecb668d50e232369f06161a4a18095012a0f9bdfe2c5c4a09aa
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close